USD ($)
$
United States Dollar
Euro Member Countries
India Rupee
د.إ
United Arab Emirates dirham
ر.س
Saudi Arabia Riyal

Operating Systems Overview

Lesson 9/37 | Study Time: 20 Min

Operating systems (OS) are the foundational software that manage computer hardware and provide a platform for applications to run. Among the many OS options available today, Windows and Linux are two of the most widely used, each with unique characteristics and security considerations.

An understanding of these operating systems, their architecture, and security features is essential for cybersecurity professionals, system administrators, and anyone responsible for securing IT environments.

Windows OS 

Windows, developed by Microsoft, is a commercially dominant OS with a user-friendly graphical interface. It is widely used in desktops, laptops, servers, and enterprise environments. Windows uses a layered architecture comprising kernel mode, user mode, and hardware abstraction layers, making it accessible and easy to use.


Security Aspects of Windows


1. Windows includes built-in security features such as Windows Defender Antivirus, Windows Firewall, and BitLocker encryption.

2. User Account Control (UAC) helps prevent unauthorized changes by requiring administrator approval.

3. Regular updates and patches address vulnerabilities; however, Windows remains a common target for malware due to its popularity.

4. Common security threats include malware, ransomware, privilege escalation vulnerabilities, and phishing attacks.


Linux OS 

Linux, an open-source OS, is highly customizable with distributions like Ubuntu, CentOS, Debian, and Kali Linux. It has a modular architecture consisting of the Linux kernel, shell, and user applications. Linux is renowned for stability, security, and flexibility, making it ideal for servers, embedded systems, and security-focused environments.


Security Aspects of Linux


1. Linux employs user permissions and access controls based on the Unix model—users, groups, and permissions (read, write, execute).

2. It inherently offers strong security features such as SELinux (Security-Enhanced Linux) and AppArmor, which enforce mandatory access controls.

3. Linux’s open-source nature allows for transparency and community-driven vulnerability detection and patching.

4. Linux systems are less targeted than Windows but still face threats like rootkits, privilege escalation, and malware.


Key Considerations for Security Professionals

Ensuring system security involves understanding how each OS manages risks, user behavior, and built-in protection mechanisms. These points outline the important areas security professionals must focus on:


1. Both OS require proper configuration, regular updates, and adherence to security best practices.

2. Windows security relies heavily on user awareness, patches, and endpoint protection tools.

3. Linux security emphasizes permissions, kernel security modules, and community vigilance.

4. Understanding vulnerabilities specific to each OS helps in creating effective defense strategies.

Jake Carter

Jake Carter

Product Designer
5.00
Profile

Class Sessions

1- What is Ethical Hacking? Purpose, Scope & Limitations 2- Types of Hackers 3- Cyber Kill Chain & Basic Attack Lifecycle 4- Legal & Ethical Considerations (Laws, Permissions, Responsible Disclosure) 5- Basics of Networking (IP, MAC, Ports, Protocols) 6- OSI & TCP/IP Models 7- Common Network Devices & Architectures (Routers, Switches, LAN/WAN) 8- Understanding Firewalls, NAT & Basic Packet Flow 9- Operating Systems Overview 10- File Systems, Users, Permissions & Access Controls 11- Introduction to Web Applications (HTTP/HTTPS, Cookies, Sessions) 12- Client vs Server Architecture Basics 13- Types of Recon (Passive vs Active) 14- Footprinting Techniques (DNS lookup, WHOIS, Website & Metadata Analysis) 15- Basic Scanning Tools Overview 16- Identifying Publicly Exposed Information & Attack Surface Basics 17- Vulnerability, Threat, Exploit: Definitions & Differences 18- Common Vulnerabilities: Misconfigurations. Default Credentials, Weak Passwords ,and Unpatched Software 19- Social Engineering Basics 20- Basic Malware Categories 21- Port Scanning Basics (Open/Closed/Filtered Ports) 22- Network Mapping Essentials 23- Service & Version Enumeration Concepts 24- Identifying Common Services (HTTP, FTP, SSH, SMB) 25- Password Security Essentials (Strength, Hashing Concepts, Common Weaknesses) 26- OS Weaknesses 27- Network Weaknesses 28- Basics of Web Vulnerabilities 29- Security Hardening Fundamentals (System, Network, User Practices) 30- Patch Management & Configuration Hygiene 31- Secure Password & Authentication Practices 32- Basic Network Security Controls (Firewalls, IDS/IPS—concept only) 33- Safe Browsing & User Awareness Essentials 34- Documenting Findings 35- Communicating Risks to Non-Technical Stakeholders 36- Responsible Disclosure Process 37- Ethical Hacker Code of Conduct